IEEE Internet of Things Journal

A Wrist-Worn Internet of Things Sensor Node for Wearable Equivalent Daylight Illuminance Monitoring
Mohammadian N, Didikoglu A, Beach C, Wright P, Mouland JW, Martial FP, Johnson S, van Tongeren M, Brown TM, Lucas RJ and Casson AJ
Light exposure is a vital regulator of physiology and behavior in humans. However, monitoring of light exposure is not included in current wearable Internet of Things (IoT) devices, and only recently have international standards defined [Formula: see text] -optic equivalent daylight illuminance (EDI) measures for how the eye responds to light. This article reports a wearable light sensor node that can be incorporated into the IoT to provide monitoring of EDI exposure in real-world settings. We present the system design, electronic performance testing, and accuracy of EDI measurements when compared to a calibrated spectral source. This includes consideration of the directional response of the sensor, and a comparison of performance when placed on different parts of the body, and a demonstration of practical use over 7 days. Our device operates for 3.5 days between charges, with a sampling period of 30 s. It has 10 channels of measurement, over the range 415-910 nm, balancing accuracy and cost considerations. Measured [Formula: see text]-opic EDI results for 13 devices show a mean absolute error of less than 0.07 log lx, and a minimum between device correlation of 0.99. These findings demonstrate that accurate light sensing is feasible, including at wrist worn locations. We provide an experimental platform for use in future investigations in real-world light exposure monitoring and IoT-based lighting control.
Federated Fuzzy Clustering for Decentralized Incomplete Longitudinal Behavioral Data
Ngo H, Fang H, Rumbut J and Wang H
The use of medical data for machine learning, including unsupervised methods such as clustering, is often restricted by privacy regulations such as the Health Insurance Portability and Accountability Act (HIPAA). Medical data is sensitive and highly regulated and anonymization is often insufficient to protect a patient's identity. Traditional clustering algorithms are also unsuitable for longitudinal behavioral health trials, which often have missing data and observe individual behaviors over varying time periods. In this work, we develop a new decentralized federated multiple imputation-based fuzzy clustering algorithm for complex longitudinal behavioral trial data collected from multisite randomized controlled trials over different time periods. Federated learning (FL) preserves privacy by aggregating model parameters instead of data. Unlike previous FL methods, this proposed algorithm requires only two rounds of communication and handles clients with varying numbers of time points for incomplete longitudinal data. The model is evaluated on both empirical longitudinal dietary health data and simulated clusters with different numbers of clients, effect sizes, correlations, and sample sizes. The proposed algorithm converges rapidly and achieves desirable performance on multiple clustering metrics. This new method allows for targeted treatments for various patient groups while preserving their data privacy and enables the potential for broader applications in the Internet of Medical Things.
Engagement-free and Contactless Bed Occupancy and Vital Signs Monitoring
Song Y, Li B, Luo D, Xie Z, Phillips BG, Ke Y and Song W
This paper presents the design and evaluation of an engagement-free and contactless vital signs and occupancy monitoring system called BedDot. While many existing works demonstrated contactless vital signs estimation, they do not address the practical challenge of environment noises, online bed occupancy detection and data quality assessment in the realworld environment. This work presents a robust signal quality assessment algorithm consisting of three parts: bed occupancy detection, movement detection, and heartbeat detection, to identify high-quality data. It also presents a series of innovative vital signs estimation algorithms that leverage the advanced signal processing and Bayesian theorem for contactless heart rate (HR), respiration rate (RR), and inter-beat interval (IBI) estimation. The experimental results demonstrate that BedDot achieves over 99% accuracy for bed occupancy detection, and MAE of 1.38 BPM, 1.54 BPM, and 24.84 ms for HR, RR, and IBI estimation, respectively, compared with an FDA-approved device. The BedDot system has been extensively tested with data collected from 75 subjects for more than 80 hours under different conditions, demonstrating its generalizability across different people and environments.
Orchestration and Management of Adaptive IoT-centric Distributed Applications
Amjad S, Akhtar A, Ali M, Afzal A, Shafiq B, Vaidya J, Shamail S and Rana O
Current Internet of Things (IoT) devices provide a diverse range of functionalities, ranging from measurement and dissemination of sensory data observation, to computation services for real-time data stream processing. In extreme situations such as emergencies, a significant benefit of IoT devices is that they can help gain a more complete situational understanding of the environment. However, this requires the ability to utilize IoT resources while taking into account location, battery life, and other constraints of the underlying edge and IoT devices. A dynamic approach is proposed for orchestration and management of distributed workflow applications using services available in cloud data centers, deployed on servers, or IoT devices at the network edge. Our proposed approach is specifically designed for knowledge-driven business process workflows that are adaptive, interactive, evolvable and emergent. A comprehensive empirical evaluation shows that the proposed approach is effective and resilient to situational changes.
Adaptive Channel-State-Information Feedback in Integrated Sensing and Communication Systems
Varshney N, Berweger S, Chuang J, Blandino S, Wang J, Pazare N, Gentile C and Golmie N
Efficient design of integrated sensing and communication systems can minimize signaling overhead by reducing the size and/or rate of feedback in reporting channel state information (CSI). To minimize the signaling overhead when performing sensing operations at the transmitter, this paper proposes a procedure to reduce the feedback rate. We consider a threshold-based sensing measurement and reporting procedure, such that the CSI is transmitted only if the channel variation exceeds a threshold. However, quantifying the channel variation, determining the threshold, and recovering sensing information with a lower feedback rate are still open problems. In this paper, we first quantify the channel variation by considering several metrics including the Euclidean distance, time-reversal resonating strength, and frequency-reversal resonating strength. We then design an algorithm to adaptively select a threshold, minimizing the feedback rate, while guaranteeing sufficient sensing accuracy by reconstructing high-quality signatures of human movement. To improve sensing accuracy with irregular channel measurements, we further propose two reconstruction schemes, which can be easily employed at the transmitter in case there is no feedback available from the receiver. Finally, the sensing performance of our scheme is extensively evaluated through real and synthetic channel measurements, considering channel estimation and synchronization errors. Our results show that the amount of feedback can be reduced by 50% while maintaining good sensing performance in terms of range and velocity estimations. Moreover, in contrast to other schemes, we show that the Euclidean distance metric is better able to capture various human movements with high channel variation values.
An Optimized IoT-enabled Big Data Analytics Architecture for Edge-Cloud Computing
Babar M, Ahmad Jan M, He X, Usman Tariq M, Mastorakis S and Alturki R
The awareness of edge computing is attaining eminence and is largely acknowledged with the rise of Internet of Things (IoT). Edge-enabled solutions offer efficient computing and control at the network edge to resolve the scalability and latency-related concerns. Though, it comes to be challenging for edge computing to tackle diverse applications of IoT as they produce massive heterogeneous data. The IoT-enabled frameworks for Big Data analytics face numerous challenges in their existing structural design, for instance, the high volume of data storage and processing, data heterogeneity, and processing time among others. Moreover, the existing proposals lack effective parallel data loading and robust mechanisms for handling communication overhead. To address these challenges, we propose an optimized IoT-enabled big data analytics architecture for edge-cloud computing using machine learning. In the proposed scheme, an edge intelligence module is introduced to process and store the big data efficiently at the edges of the network with the integration of cloud technology. The proposed scheme is composed of two layers: IoT-edge and Cloud-processing. The data injection and storage is carried out with an optimized MapReduce parallel algorithm. Optimized Yet Another Resource Negotiator (YARN) is used for efficiently managing the cluster. The proposed data design is experimentally simulated with an authentic dataset using Apache Spark. The comparative analysis is decorated with existing proposals and traditional mechanisms. The results justify the efficiency of our proposed work.
Integrated Sensing and Communication: Enabling Techniques, Applications, Tools and Data Sets, Standardization, and Future Directions
Wang J, Varshney N, Gentile C, Blandino S, Chuang J and Golmie N
The design of integrated sensing and communication (ISAC) systems has drawn recent attention for its capacity to solve a number of challenges. Indeed, ISAC can enable numerous benefits, such as the sharing of spectrum resources, hardware, and software, and improving the interoperability of sensing and communication. In this article, we seek to provide a thorough investigation of ISAC. We begin by reviewing the paradigms of sensing-centric design, communication-centric design, and co-design of sensing and communication. We then explore the enabling techniques that are viable for ISAC (i.e., transmit waveform design, environment modeling, sensing source, signal processing, and data processing). We also present some emergent smart-world applications that could benefit from ISAC. Furthermore, we describe some prominent tools used to collect sensing data and publicly available sensing data sets for research and development, as well as some standardization efforts. Finally, we highlight some challenges and new areas of research in ISAC, providing a helpful reference for ISAC researchers and practitioners, as well as the broader research and industry communities.
A Sensor Network Utilizing Consumer Wearables for Telerehabilitation of Post-Acute COVID-19 Patients
Bures M, Neumannova K, Blazek P, Klima M, Schvach H, Nema J, Kopecky M, Dygryn J and Koblizek V
A considerable number of patients with COVID-19 suffer from respiratory problems in the post-acute phase of the disease (the second-third month after disease onset). Individual telerehabilitation and telecoaching are viable, effective options for treating these patients. To treat patients individually, medical staff must have detailed knowledge of their physical activity and condition. A sensor network that utilizes medical-grade devices can be created to collect these data, but the price and availability of these devices might limit such a network's scalability to larger groups of patients. Hence, the use of low-cost commercial fitness wearables is an option worth exploring. This article presents the concept and technical infrastructure of such a telerehabilitation program that started in April 2021 in the Czech Republic. A pilot controlled study with 14 patients with COVID-19 indicated the program's potential to improve patients' physical activity, (85.7% of patients in telerehabilitation versus 41.9% educational group) and exercise tolerance (71.4% of patients in telerehabilitation versus 42.8% of the educational group). Regarding the accuracy of collected data, the used commercial wristband was compared with the medical-grade device in a separate test. Evaluating [Formula: see text]-scores of the intensity of participants' physical activity in this test, the difference in data is not statistically significant at level [Formula: see text]. Hence, the used infrastructure can be considered sufficiently accurate for the telerehabilitation program examined in this study. The technical and medical aspects of the problem are discussed, as well as the technical details of the solution and the lessons learned, regarding using this approach to treat COVID-19 patients in the post-acute phase.
Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems
Adil M, Jan MA, Mastorakis S, Song H, Jadoon MM, Abbas S and Farouk A
Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash-MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.
Someone to Watch Over You: Using Bluetooth Beacons for Alerting Distracted Pedestrians
Hasan R, Hoque MA, Karim Y, Griffin R, Schwebel DC and Hasan R
In the United States, an estimated 7,005 (crude rate 2.13) pedestrians were killed in traffic crashes in 2020, according to the Centers for Disease Control and Prevention (CDC). This statistic is currently increasing annually and research suggests that distraction by smartphones may be a primary reason for the increasing number of pedestrian injuries and deaths. Timely interruptions may alert inattentive pedestrians and prevent fatalities. To this end, we developed StreetBit, a Bluetooth beacon-based system that warns distracted pedestrians with a visual and/or audible interruption when they approach a potentially dangerous traffic intersection while distracted by their smartphones. We posit that by using StreetBit, we can educate distracted pedestrians and elicit behavioral change to reduce or remove smartphone-based distractions when they enter and cross roadways. To demonstrate the feasibility of StreetBit, we conducted a field study with 385 participants. Results show that the system demonstrates adequate feasibility and behavior change in response to the StreetBit program.
Toward Detecting Previously Undiscovered Interaction Types in Networked Systems
Jia W, Lu L, Mariani MS, Dai Y and Jiang T
Studying networked systems in a variety of domains, including biology, social science, and Internet of Things, has recently received a surge of attention. For a networked system, there are usually multiple types of interactions between its components, and such interaction-type information is crucial since it always associated with important features. However, some interaction types that actually exist in the network may not be observed in the metadata collected in practice. This article proposes an approach aiming to detect previously undiscovered interaction types (PUITs) in networked systems. The first step in our proposed PUIT detection approach is to answer the following fundamental question: is it possible to effectively detect PUITs without utilizing metadata other than the existing incomplete interaction-type information and the connection information of the system? Here, we first propose a temporal network model which can be used to mimic any real network and then discover that some special networks which fit the model shall a common topological property. Supported by this discovery, we finally develop a PUIT detection method for networks which fit the proposed model. Both analytical and numerical results show this detection method is more effective than the baseline method, demonstrating that effectively detecting PUITs in networks is achievable. More studies on PUIT detection are of significance and in great need since this approach should be as essential as the previously undiscovered node-type detection which has gained great success in the field of biology.
CONGO²: Scalable Online Anomaly Detection and Localization in Power Electronics Networks
Yu J, Cheng H, Zhang J, Li Q, Wu S, Zhong W, Ye J, Song W and Ma P
Rapid and accurate detection and localization of electronic disturbances simultaneously are important for preventing its potential damages and determining potential remedies. Existing anomaly detection methods are severely limited by the low accuracy, the expensive computational cost and the need for highly trained personnel. There is an urgent need for a scalable online algorithm for in-field analysis of large-scale power electronics networks. In this paper, we propose a fast and accurate algorithm for anomaly detection and localization of power electronics networks: stratified colored-node graph (CONGO). This algorithm hierarchically models the change of correlated waveforms and then correlated sensors using the colored-node graph. By aggregating the change of each sensor with its neighbors' inputs, we can spontaneously identify and localize the anomaly that cannot be detected by data collected from a single sensor. As our proposed method only focuses on the changes within a short time frame, it is highly computational efficient and only needs small data storage. Thus, our method is ideal for online and reliable anomaly detection and localization of large-scale power electronic networks. Compared to existing anomaly detection methods, our method is entirely data-driven without training data, highly accurate and reliable for wide-spectrum anomalies detection, and more importantly, capable of both detection and localization. Thus, it is ideal for in-field deployment for large-scale power electronic networks. As illustrated by a distributed energy resources (DERs) power grid with 37-node, our method can effectively detect and localize various cyber and physical attacks.
Role of Data Augmentation Strategies in Knowledge Distillation for Wearable Sensor Data
Jeon ES, Som A, Shukla A, Hasanaj K, Buman MP and Turaga P
Deep neural networks are parametrized by several thousands or millions of parameters, and have shown tremendous success in many classification problems. However, the large number of parameters makes it difficult to integrate these models into edge devices such as smartphones and wearable devices. To address this problem, knowledge distillation (KD) has been widely employed, that uses a pre-trained high capacity network to train a much smaller network, suitable for edge devices. In this paper, for the first time, we study the applicability and challenges of using KD for time-series data for wearable devices. Successful application of KD requires specific choices of data augmentation methods during training. However, it is not yet known if there exists a coherent strategy for choosing an augmentation approach during KD. In this paper, we report the results of a detailed study that compares and contrasts various common choices and some hybrid data augmentation strategies in KD based human activity analysis. Research in this area is often limited as there are not many comprehensive databases available in the public domain from wearable devices. Our study considers databases from small scale publicly available to one derived from a large scale interventional study into human activity and sedentary behavior. We find that the choice of data augmentation techniques during KD have a variable level of impact on end performance, and find that the optimal network choice as well as data augmentation strategies are specific to a dataset at hand. However, we also conclude with a general set of recommendations that can provide a strong baseline performance across databases.
Towards Deep Q-Network Based Resource Allocation in Industrial Internet of Things
Liang F, Yu W, Liu X, Griffith D and Golmie N
With the increasing adoption of Industrial Internet of Things (IIoT) devices, infrastructures, and supporting applications, it is critical to design schemes to effectively allocate resources (e.g., networking, computing, and energy) in IIoT systems, generally formalized as optimization problems. Nonetheless, because the system is highly complex, operation environments are time-varying, and required information may not be available, it is difficult to leverage traditional optimization techniques to solve the optimal resource allocation problem. To this end, in this paper we propose a Deep -Network (DQN) based scheme to address both bandwidth utilization and energy efficiency in an IIoT system. In detail, we design a DQN model that consists of two deep neural networks (DNN) and a -learning model. The DNN network abstracts the features from the highly dimensional inputs and obtains the approximate -function for the -learning model. Based on the -function, the -learning model can generate the -table and reward function. After the training process, the DQN model can select appropriate actions for the agents (i.e., robots in a smart warehouse in this study) to improve bandwidth utilization and energy efficiency. To evaluate our proposed scheme, we design a simulation environment to investigate a typical IIoT scenario: the actuation of robotics in a smart warehouse. We then implement the DQN model and conduct extensive experiments to validate the efficacy of our scheme. Our experimental results confirm that our scheme can improve both bandwidth utilization and energy efficiency, as compared to other representative schemes.
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment
Saha R, Kumar G, Kumar N, Kim TH, Devgun T, Thomas R and Barnawi A
The pandemic/epidemic of COVID-19 has affected people worldwide. A huge number of lives succumbed to death due to the sudden outbreak of this corona virus infection. The specified symptoms of COVID-19 detection are very common like normal flu; asymptomatic version of COVID-19 has become a critical issue. Therefore, as a precautionary measurement, the oxygen level needs to be monitored by every individual if no other critical condition is found. It is not the only parameter for COVID-19 detection but, as per the suggestions by different medical organizations such as the World Health Organization, it is better to use oximeter to monitor the oxygen level in probable patients as a precaution. People are using the oximeters personally; however, not having any clue or guidance regarding the measurements obtained. Therefore, in this article, we have shown a framework of oxygen level monitoring and severity calculation and probabilistic decision of being a COVID-19 patient. This framework is also able to maintain the privacy of patient information and uses probabilistic classification to measure the severity. Results are measured based on latency of blockchain creation and overall response, throughput, detection, and severity accuracy. The analysis finds the solution efficient and significant in the Internet of Things framework for the present health hazard in our world.
Smoking Cessation System for Preemptive Smoking Detection
Maguire G, Chen H, Schnall R, Xu W and Huang MC
Smoking cessation is a significant challenge for many people addicted to cigarettes and tobacco. Mobile health-related research into smoking cessation is primarily focused on mobile phone data collection either using self-reporting or sensor monitoring techniques. In the past 5 years with the increased popularity of smartwatch devices, research has been conducted to predict smoking movements associated with smoking behaviors based on accelerometer data analyzed from the internal sensors in a user's smartwatch. Previous smoking detection methods focused on classifying current user smoking behavior. For many users who are trying to quit smoking, this form of detection may be insufficient as the user has already relapsed. In this paper, we present a smoking cessation system utilizing a smartwatch and finger sensor that is capable of detecting pre-smoking activities to discourage users from future smoking behavior. Pre-smoking activities include grabbing a pack of cigarettes or lighting a cigarette and these activities are often immediately succeeded by smoking. Therefore, through accurate detection of pre-smoking activities, we can alert the user before they have relapsed. Our smoking cessation system combines data from a smartwatch for gross accelerometer and gyroscope information and a wearable finger sensor for detailed finger bend-angle information. We compare the results of a smartwatch-only system with a combined smartwatch and finger sensor system to illustrate the accuracy of each system. The combined smartwatch and finger sensor system performed at an 80.6% accuracy for the classification of pre-smoking activities compared to 47.0% accuracy of the smartwatch-only system.
The Impact of Covid-19 on Smartphone Usage
Li T, Zhang M, Li Y, Lagerspetz E, Tarkoma S and Hui P
The outbreak of Covid-19 changed the world as well as human behavior. In this article, we study the impact of Covid-19 on smartphone usage. We gather smartphone usage records from a global data collection platform called Carat, including the usage of mobile users in North America from November 2019 to April 2020. We then conduct the first study on the differences in smartphone usage across the outbreak of Covid-19. We discover that Covid-19 leads to a decrease in users' smartphone engagement and network switches, but an increase in WiFi usage. Also, its outbreak causes new typical diurnal patterns of both memory usage and WiFi usage. Additionally, we investigate the correlations between smartphone usage and daily confirmed cases of Covid-19. The results reveal that memory usage, WiFi usage, and network switches of smartphones have significant correlations, whose absolute values of Pearson coefficients are greater than 0.8. Moreover, smartphone usage behavior has the strongest correlation with the Covid-19 cases occurring after it, which exhibits the potential of inferring outbreak status. By conducting extensive experiments, we demonstrate that for the inference of outbreak stages, both Macro-F1 and Micro-F1 can achieve over 0.8. Our findings explore the values of smartphone usage data for fighting against the epidemic.
The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic
Castiglione A, Umer M, Sadiq S, Obaidat MS and Vijayakumar P
Currently, COVID-19 pandemic is the major cause of disease burden globally. So, there is a need for an urgent solution to fight against this pandemic. Internet of Things (IoT) has the ability of data transmission without human interaction. This technology enables devices to connect in the hospitals and other planned locations to combat this situation. This article provides a road map by highlighting the IoT applications that can help to control it. This study also proposes a real-time identification and monitoring of COVID-19 patients. The proposed framework consists of four components using the cloud architecture: 1) data collection of disease symptoms (using IoT-based devices); 2) health center or quarantine center (data collected using IoT devices); 3) data warehouse (analysis using machine learning models); and 4) health professionals (provide treatment). To predict the severity level of COVID-19 patients on the basis of IoT-based real-time data, we experimented with five machine learning models. The results reveal that random forest outperformed among all other models. IoT applications will help management, health professionals, and patients to investigate the symptoms of contagious disease and manage COVID-19 +ve patients worldwide.
Passive UHF RFID-based Knitted Wearable Compression Sensor
Tajin MAS, Amanatides CE, Dion G and Dandekar KR
One of the major challenges faced by passive on-body wireless Internet of Things (IoT) sensors is the absorption of radiated power by tissues in the human body. We present a battery-less, wearable knitted Ultra High Frequency (UHF, 902-928 MHz) Radio Frequency Identification (RFID) compression sensor (Bellypatch) antenna and show its applicability as an on-body respiratory monitor. The antenna radiation efficiency is satisfactory in both free-space and on-body operations. We extract RF (Radio Frequency) sheet resistance values of three knitted silver-coated nylon fabric candidates at 913 MHz. The best type of fabric is selected based on the extracted RF sheet resistance. Simulated and measured performance of the antenna confirm suitability for on-body applications. The proposed Bellypatch antenna is used to measure the breathing activity of a programmable infant patient emulator mannequin (SimBaby) and a human subject. The antenna is highly sensitive to respiratory compression and relaxation. Fluctuations in the backscatter power level/Received Signal Strength Indicator (RSSI) in both cases range from 6 dB to 15 dB. The improved on-body read range of the proposed sensor antenna is 5.8 m, about 10 times higher than its predecessor wearable knitted strain sensing Bellyband antenna (0.6 m). The maximum simulated Specific Absorption Rate (SAR) on a human torso model is 0.25 W/kg, lower than the maximum allowable limit of 1.6 W/kg.
Harnessing the Power of Smart and Connected Health to Tackle COVID-19: IoT, AI, Robotics, and Blockchain for a Better World
Firouzi F, Farahani B, Daneshmand M, Grise K, Song J, Saracco R, Wang LL, Lo K, Angelov P, Soares E, Loh PS, Talebpour Z, Moradi R, Goodarzi M, Ashraf H, Talebpour M, Talebpour A, Romeo L, Das R, Heidari H, Pasquale D, Moody J, Woods C, Huang ES, Barnaghi P, Sarrafzadeh M, Li R, Beck KL, Isayev O, Sung N and Luo A
As COVID-19 hounds the world, the common cause of finding a swift solution to manage the pandemic has brought together researchers, institutions, governments, and society at large. The Internet of Things (IoT), artificial intelligence (AI)-including machine learning (ML) and Big Data analytics-as well as Robotics and Blockchain, are the four decisive areas of technological innovation that have been ingenuity harnessed to fight this pandemic and future ones. While these highly interrelated smart and connected health technologies cannot resolve the pandemic overnight and may not be the only answer to the crisis, they can provide greater insight into the disease and support frontline efforts to prevent and control the pandemic. This article provides a blend of discussions on the contribution of these digital technologies, propose several complementary and multidisciplinary techniques to combat COVID-19, offer opportunities for more holistic studies, and accelerate knowledge acquisition and scientific discoveries in pandemic research. First, four areas, where IoT can contribute are discussed, namely: 1) tracking and tracing; 2) remote patient monitoring (RPM) by wearable IoT (WIoT); 3) personal digital twins (PDTs); and 4) real-life use case: ICT/IoT solution in South Korea. Second, the role and novel applications of AI are explained, namely: 1) diagnosis and prognosis; 2) risk prediction; 3) vaccine and drug development; 4) research data set; 5) early warnings and alerts; 6) social control and fake news detection; and 7) communication and chatbot. Third, the main uses of robotics and drone technology are analyzed, including: 1) crowd surveillance; 2) public announcements; 3) screening and diagnosis; and 4) essential supply delivery. Finally, we discuss how distributed ledger technologies (DLTs), of which blockchain is a common example, can be combined with other technologies for tackling COVID-19.
Wireless Qi-powered, Multinodal and Multisensory Body Area Network for Mobile Health
Dautta M, Jimenez A, Dia KKH, Rashid N, Abdullah Al Faruque M and Tseng P
Wireless, battery-free Body Area Networks (BAN) enable reliable long-term health monitoring with minimal intervention, and have the potential to transform patient care via mobile health monitoring. Current approaches for achieving such battery-free networks are limited in the number, capability, and positioning of sensing nodes-this is related to constraints in power supply, data rate, and working distance requirements between the wireless power source and sensing nodes. Here, we investigate a Qi-based, near-field power transfer scheme that can effectively drive wireless, battery-free, multi-node and multi-sensor BAN over long distances. This consists of a single Qi power source (such as a cellphone), a detached/untethered Passive Intermediate Relay (PIR) (facilitates power transfer from a central Qi source to multiple nodes on the body), and finally individual/detached sensing nodes placed throughout the body. Alongside this power scheme we implement the star network topology of a Gazell protocol to enable the continuous connection of one host to many sensing nodes while minimizing data loss over long temporal periods. The high-power transmission capabilities of Qi enables wireless support for a multitude of sensors (up to 12), and sensing nodes (up to 6) with a single transmitter at long distances (60 cm) and a sample rate of 20 Hz. This scheme is studied both in-vitro and in-vivo on the body.